Detecting Attacker Behavior With Splunk Based On TTPs
Crafting SPL Searches Based On Known TTPs
Example: Detection Of Reconnaissance Activities Leveraging Native Windows Binaries
index="main" sourcetype="WinEventLog:Sysmon" EventCode=1 Image=*\\ipconfig.exe OR Image=*\\net.exe OR Image=*\\whoami.exe OR Image=*\\netstat.exe OR Image=*\\nbtstat.exe OR Image=*\\hostname.exe OR Image=*\\tasklist.exe | stats count by Image,CommandLine | sort - countExample: Detection Of Requesting Malicious Payloads/Tools Hosted On Reputable/Whitelisted Domains (Such As githubusercontent.com)
index="main" sourcetype="WinEventLog:Sysmon" EventCode=22 QueryName="*github*" | stats count by Image, QueryNameExample: Detection Of PsExec Usage
Case 1:Leveraging Sysmon Event ID 13
Case 2: Leveraging Sysmon Event ID 11
Case 3: Leveraging Sysmon Event ID 18
Example: Detection Of Utilizing Archive Files For Transferring Tools Or Data Exfiltration
Example: Detection Of Utilizing PowerShell or MS Edge For Downloading Payloads/Tools
Example: Detection Of Execution From Atypical Or Suspicious Locations
Example: Detection Of Executables or DLLs Being Created Outside The Windows Directory
Example: Detection Of Misspelling Legitimate Binaries
Example: Detection Of Using Non-standard Ports For Communications/Transfers
PreviousIntrustion Detection with SplunkNextDetecting Attacker Behavior With Splunk Based On Analytics
Last updated

